Certified Ethical Hacker (CEH)

Overview:
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. Students then learn how intruders escalate privileges and what steps can be taken to secure a system.

Outline (summarized):
Lesson 1: Introduction to Ethical Hacking
Lesson 2: Hacking Laws
Lesson 3: Footprinting
Lesson 4: Google Hacking
Lesson 5: Scanning
Lesson 6: Enumeration
Lesson 7: System Hacking
Lesson 8: Trojans and Backdoors
Lesson 9: Viruses and Worms
Lesson 10: Sniffers
Lesson 11: Social Engineering (DVD)
Lesson 12: Phishing (DVD)
Lesson 13: Hacking Email Accounts (DVD)
Lesson 14: Denial-of-Service
Lesson 16: Hacking Web Servers
Lesson 17: Web Application Vulnerabilities
Lesson 18: Web-Based Password Cracking Techniques
Lesson 19: SQL Injection
Lesson 20: Hacking Wireless Networks
Lesson 21: Physical Security (DVD)
Lesson 22: Linux Hacking
Lesson 23: Evading IDS, Firewalls and Detecting Honey Pots
Lesson 24: Buffer Overflows
Lesson 25: Cryptography